Search Results for Data encryption (Computer science) - Narrowed by: Electronic books.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-07T21:06:20ZCryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11249502026-04-07T21:06:20Z2026-04-07T21:06:20Zby Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232026-04-07T21:06:20Z2026-04-07T21:06:20Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Electronic Resources<br/>Information hidingent://SD_ILS/0/SD_ILS:11243132026-04-07T21:06:20Z2026-04-07T21:06:20Zby Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821270">Click to View</a><br/>Format: Electronic Resources<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142026-04-07T21:06:20Z2026-04-07T21:06:20Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography protocols, design and applicationsent://SD_ILS/0/SD_ILS:10607492026-04-07T21:06:20Z2026-04-07T21:06:20Zby Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format: Electronic Resources<br/>Identity-based cryptographyent://SD_ILS/0/SD_ILS:9530802026-04-07T21:06:20Z2026-04-07T21:06:20Zby Joye, Marc, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433453">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to identity-based encryptionent://SD_ILS/0/SD_ILS:9452512026-04-07T21:06:20Z2026-04-07T21:06:20Zby Martin, Luther.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338784">Click to View</a><br/>Format: Electronic Resources<br/>Quantum cryptography potentially perfect security.ent://SD_ILS/0/SD_ILS:10920202026-04-07T21:06:20Z2026-04-07T21:06:20Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format: Electronic Resources<br/>Color image watermarking : algorithms and technologiesent://SD_ILS/0/SD_ILS:11225632026-04-07T21:06:20Z2026-04-07T21:06:20Zby Su, Qingtang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4790352">Click to View</a><br/>Format: Electronic Resources<br/>Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyondent://SD_ILS/0/SD_ILS:10429932026-04-07T21:06:20Z2026-04-07T21:06:20Zby Salam, Abdul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895695">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography cracking codesent://SD_ILS/0/SD_ILS:10153082026-04-07T21:06:20Z2026-04-07T21:06:20Zby Curley, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220658">Click to View</a><br/>Format: Electronic Resources<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:10118942026-04-07T21:06:20Z2026-04-07T21:06:20Zby Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462026-04-07T21:06:20Z2026-04-07T21:06:20Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312026-04-07T21:06:20Z2026-04-07T21:06:20Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Electronic Resources<br/>Machine learning in image steganalysisent://SD_ILS/0/SD_ILS:10010092026-04-07T21:06:20Z2026-04-07T21:06:20Zby Schaathun, Hans Georg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1022347">Click to View</a><br/>Format: Electronic Resources<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-04-07T21:06:20Z2026-04-07T21:06:20Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Security of block ciphers : from algorithm design to hardware implementationent://SD_ILS/0/SD_ILS:11030072026-04-07T21:06:20Z2026-04-07T21:06:20Zby Sakiyama, Kazuo, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4037343">Click to View</a><br/>Format: Electronic Resources<br/>Burdens of proof cryptographic culture and evidence law in the age of electronic documentsent://SD_ILS/0/SD_ILS:10820422026-04-07T21:06:20Z2026-04-07T21:06:20Zby Blanchette, Jean-François.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339459">Click to View</a><br/>Format: Electronic Resources<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:10207412026-04-07T21:06:20Z2026-04-07T21:06:20Zby Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122026-04-07T21:06:20Z2026-04-07T21:06:20Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Electronic Resources<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-04-07T21:06:20Z2026-04-07T21:06:20Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Electronic Resources<br/>Surveillance or security? the risks posed by new wiretapping technologiesent://SD_ILS/0/SD_ILS:10821532026-04-07T21:06:20Z2026-04-07T21:06:20Zby Landau, Susan Eva.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339582">Click to View</a><br/>Format: Electronic Resources<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322026-04-07T21:06:20Z2026-04-07T21:06:20Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Electronic Resources<br/>Privacy on the line the politics of wiretapping and encryptionent://SD_ILS/0/SD_ILS:10813192026-04-07T21:06:20Z2026-04-07T21:06:20Zby Diffie, Whitfield.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338688">Click to View</a><br/>Format: Electronic Resources<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052026-04-07T21:06:20Z2026-04-07T21:06:20Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Electronic Resources<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182026-04-07T21:06:20Z2026-04-07T21:06:20Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Electronic Resources<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-04-07T21:06:20Z2026-04-07T21:06:20Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Guide to pairing-based cryptographyent://SD_ILS/0/SD_ILS:11407992026-04-07T21:06:20Z2026-04-07T21:06:20Zby El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format: Electronic Resources<br/>Quantum cryptography and computing theory and implementationent://SD_ILS/0/SD_ILS:10576622026-04-07T21:06:20Z2026-04-07T21:06:20Zby Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format: Electronic Resources<br/>Video encryption technology and applicationent://SD_ILS/0/SD_ILS:10600892026-04-07T21:06:20Z2026-04-07T21:06:20Zby Xu, Zhengquan, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3020071">Click to View</a><br/>Format: Electronic Resources<br/>Modelling cyber security approaches, methodology, strategiesent://SD_ILS/0/SD_ILS:9625772026-04-07T21:06:20Z2026-04-07T21:06:20Zby NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format: Electronic Resources<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-04-07T21:06:20Z2026-04-07T21:06:20Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Electronic Resources<br/>Implementing SSH strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:9297212026-04-07T21:06:20Z2026-04-07T21:06:20Zby Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format: Electronic Resources<br/>ExamWise for CIW security professional exam 1D0-470ent://SD_ILS/0/SD_ILS:10919422026-04-07T21:06:20Z2026-04-07T21:06:20Zby Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format: Electronic Resources<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11932382026-04-07T21:06:20Z2026-04-07T21:06:20Zby Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Electronic Resources<br/>Data hiding fundamentals and applications : content security in digital mediaent://SD_ILS/0/SD_ILS:11867322026-04-07T21:06:20Z2026-04-07T21:06:20Zby Sencar, Husrev T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120471447">http://www.sciencedirect.com/science/book/9780120471447</a><br/>Format: Electronic Resources<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632026-04-07T21:06:20Z2026-04-07T21:06:20Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>